Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2023, 23:10

General

  • Target

    46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe

  • Size

    53KB

  • MD5

    57b9314acd1bbd7a9edac75056a9966f

  • SHA1

    7233a3c31b5add992e1a6e53877a21cbf672803c

  • SHA256

    46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53

  • SHA512

    a484a1ec10bb6cf26d21c518851c64f711a3ed3db426b90ca5065a94afa8d0a2279ddb9363e236c01ed7c1077ec3da0c996aabbeb17c8a730b5d6f201aec6adc

  • SSDEEP

    1536:c331fgLdQAQfwt7FZJ92BsooAYPJwPo5y7:cn1ftffepVPJAYPJwg5Q

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1288
      • C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
        "C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:460
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a4B14.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2076
          • C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe
            "C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe"
            4⤵
            • Executes dropped EXE
            PID:2844
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2604
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
                PID:2744

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

              Filesize

              251KB

              MD5

              f4248ef43978b9abee5a392ad8a53570

              SHA1

              a76be5ee8ce18dcbb9beb7039ac212c33dcdfa8c

              SHA256

              03bb5c0f3c63de1ffe74ef992b0b5445904095250291b9678f342ff684babf02

              SHA512

              c43850d304970d194b548d384d31fc49afcb350bc6067f9eabbe3f7279c55815d600adee262b7ede9e86596b46cdac96756d5abdb305dcd854b96a0c6d165ad3

            • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

              Filesize

              471KB

              MD5

              1a0dbecba0dbb963c2f3b0448796d47a

              SHA1

              5c0b5d378d3614fe984ce2915b5720886992da0c

              SHA256

              1ea2fb84177a921bc3df4763c3da53a970e192f93f6175d09696ded019e50cf8

              SHA512

              8e25dc08fa6f280a6bc1ccacb1ce665ab055b5d539f8915915fc7536c90185a221cb0c50a02d34b521b871b8487a155b9c40a5f25df87306e1df24ca7e96da25

            • C:\Users\Admin\AppData\Local\Temp\$$a4B14.bat

              Filesize

              722B

              MD5

              9c947f8b2b49c964298028b409c9ceda

              SHA1

              d32267fc4ed6e5850a941b1bafebaba530db5dcd

              SHA256

              dfc8eaa8cb303934bc508518cf4e11448114479827c9af4612bfd30c7e5bafaa

              SHA512

              4d1d46f9db7f92166e030fb8ff06133b59f226a67d7ed6466aed3e3100a68546395c525c45efcb6f903e7769d362f60d9095f7c129bb90144bd159881ae2ad11

            • C:\Users\Admin\AppData\Local\Temp\$$a4B14.bat

              Filesize

              722B

              MD5

              9c947f8b2b49c964298028b409c9ceda

              SHA1

              d32267fc4ed6e5850a941b1bafebaba530db5dcd

              SHA256

              dfc8eaa8cb303934bc508518cf4e11448114479827c9af4612bfd30c7e5bafaa

              SHA512

              4d1d46f9db7f92166e030fb8ff06133b59f226a67d7ed6466aed3e3100a68546395c525c45efcb6f903e7769d362f60d9095f7c129bb90144bd159881ae2ad11

            • C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe

              Filesize

              27KB

              MD5

              827a092884efbae20acbaa713a5c87c5

              SHA1

              3edac2e7b2f1adc6701ccc14a99f8050e73eb7b6

              SHA256

              77ed5d76c4185fa34b444b99859c80d4f5773c4c5a76fecca12abea40f749046

              SHA512

              25943ce74ea644a7e8a1ceb8157008c39475eec97d5f3bb1d73538f33b1a3ca6cd7cb89f81f15a0239bea35999cb949b8854db4c80f0eb2cf3ff0c2243974731

            • C:\Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe.exe

              Filesize

              27KB

              MD5

              827a092884efbae20acbaa713a5c87c5

              SHA1

              3edac2e7b2f1adc6701ccc14a99f8050e73eb7b6

              SHA256

              77ed5d76c4185fa34b444b99859c80d4f5773c4c5a76fecca12abea40f749046

              SHA512

              25943ce74ea644a7e8a1ceb8157008c39475eec97d5f3bb1d73538f33b1a3ca6cd7cb89f81f15a0239bea35999cb949b8854db4c80f0eb2cf3ff0c2243974731

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              934cdf8e20087ae21c328ff42ebb5cb4

              SHA1

              758db62111fd17fd95c8afcec7f1f459b0b3e14b

              SHA256

              08ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c

              SHA512

              8cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              934cdf8e20087ae21c328ff42ebb5cb4

              SHA1

              758db62111fd17fd95c8afcec7f1f459b0b3e14b

              SHA256

              08ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c

              SHA512

              8cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c

            • C:\Windows\Logo1_.exe

              Filesize

              26KB

              MD5

              934cdf8e20087ae21c328ff42ebb5cb4

              SHA1

              758db62111fd17fd95c8afcec7f1f459b0b3e14b

              SHA256

              08ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c

              SHA512

              8cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c

            • C:\Windows\rundl132.exe

              Filesize

              26KB

              MD5

              934cdf8e20087ae21c328ff42ebb5cb4

              SHA1

              758db62111fd17fd95c8afcec7f1f459b0b3e14b

              SHA256

              08ddf63525bc6bd142a44d29a82d6a81a137e35757513edc9a61a4d7e422834c

              SHA512

              8cf66624e6937f7a5028dba3428348fa4e9be98f138f132ea0e5577585be1ca7fefefaa1375456caf27962c9cf63cc305228097421e62bcc520c4c5d4177385c

            • F:\$RECYCLE.BIN\S-1-5-21-3618187007-3650799920-3290345941-1000\_desktop.ini

              Filesize

              10B

              MD5

              0d897ff63d6d70834691031400f75fba

              SHA1

              1527f718ccce51339d233a1a409fbc4a27fe73d6

              SHA256

              4ae6beff7729c454ddd8204bac0ebeaf452455e43ffb2e7e6fef227f1ad09169

              SHA512

              6cdd19fa414b78c81ac442e75cb85fc7ec97444b80373cd4de0ca20b72f7a6a474589d44202ab04d7a493f2c202ab60951c51d031a4ff95f5a878fa93039794d

            • \Users\Admin\AppData\Local\Temp\46662c3c7ba67f606336249de3469a1954ce87a0cac6d7cd37adcc46b2147b53.exe

              Filesize

              27KB

              MD5

              827a092884efbae20acbaa713a5c87c5

              SHA1

              3edac2e7b2f1adc6701ccc14a99f8050e73eb7b6

              SHA256

              77ed5d76c4185fa34b444b99859c80d4f5773c4c5a76fecca12abea40f749046

              SHA512

              25943ce74ea644a7e8a1ceb8157008c39475eec97d5f3bb1d73538f33b1a3ca6cd7cb89f81f15a0239bea35999cb949b8854db4c80f0eb2cf3ff0c2243974731

            • memory/460-0-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/460-16-0x00000000003A0000-0x00000000003D4000-memory.dmp

              Filesize

              208KB

            • memory/460-15-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/1288-29-0x0000000002AA0000-0x0000000002AA1000-memory.dmp

              Filesize

              4KB

            • memory/2652-90-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-44-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-21-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-96-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-303-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-1849-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-38-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-3309-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB

            • memory/2652-31-0x0000000000400000-0x0000000000434000-memory.dmp

              Filesize

              208KB